1,075 research outputs found

    Mixed mode education: implications for library user services

    Get PDF
    The Faculty of Information Technology at QUT does not formally carry out distance education for any of its courses. However, it has pursued a number of initiatives that have made it possible for students to carry out an increasing proportion of their coursework off-site. These initiatives include computer-managed learning, World Wide Web and CDROM delivery of administrative and educational materials, and most recently the development of an integrated learning environment (ILE) for electronic delivery. These developments have been complemented and supported by the QUT Library by means of different avenues of access to CDROMs, a regional electronic document delivery service (REDD), and an electronic reserve (E-Reserve) service. Issues associated with the operation and evaluation of such facilities are described, and future library role in educational delivery are discussed

    An analysis of security issues in building automation systems

    Get PDF
    The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media. Through the use of IP-based communication and encapsulated protocols, BAS are increasingly being connected to corporate networks and also being remotely accessed for management purposes, both for convenience and emergency purposes. These protocols, however, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations, relying on security through obscurity. Research has been undertaken into addressing the shortfalls of security implementations in BAS, however defining the threats against BAS, and detection of these threats is an area that is particularly lacking. This paper presents an overview of the current security measures in BAS, outlining key issues, and methods that can be improved to protect cyber physical systems against the increasing threat of cyber terrorism and hacktivism. Future research aims to further evaluate and improve the detection systems used in BAS through first defining the threats and then applying and evaluating machine learning algorithms for traffic classification and IDS profiling capable of operating on resource constrained BAS

    Wetland productivity determines trade-off between biodiversity support and greenhouse gas production

    Get PDF
    Establishing wetlands for nutrient capture and biodiversity support may introduce trade-offs between environmentally beneficial functions and detrimental greenhouse gas emissions. Investigating the interaction of nutrient capture, primary production, greenhouse gas production and biodiversity support is imperative to understanding the overall function of wetlands and determining possible beneficial synergistic effects and trade-offs. Here, we present temporally replicated data from 17 wetlands in hemi-boreal Sweden. We explored the relationship between nutrient load, primary producing algae, production of methane and nitrous oxide, and emergence rates of chironomids to determine what factors affected each and how they related to each other. Chironomid emergence rates correlated positively with methane production and negatively with nitrous oxide production, where water temperature was the main driving factor. Increasing nutrient loads reduced methanogenesis through elevated nitrogen concentrations, while simultaneously enhancing nitrous oxide production. Nutrient loads only indirectly increased chironomid emergence rates through increased chlorophyll-a concentration, via increased phosphorus concentrations, with certain taxa and food preference functional groups benefitting from increased chlorophyll-a concentrations. However, water temperature seemed to be the main driving factor for chironomid emergence rates, community composition and diversity, as well as for greenhouse gas production. These findings increase our understanding of the governing relationships between biodiversity support and greenhouse gas production, and should inform future management when constructing wetlands

    ALTRUISM AS A THICK CONCEPT

    Get PDF
    In this paper, we examine different forms of altruism. We commence by analysing the ‘behavioural' definition and, after clarifying its conditions for altruism, we argue that it is not in ‘reflective equilibrium' with everyday linguistic usage of the term. We therefore consider a ‘psychological' definition, which we likewise refine, and argue that it better reflects ordinary language use. Both behavioural and psychological approaches define altruism descriptively and thus fail to capture an important aspect of altruism, namely its normative component. Altruism, we argue, is a ‘thick concept', i.e. one which embodies both positive and normative components. We discuss and compare various formulations of this normative componen

    Lagrangian Based Methods for Coherent Structure Detection

    Get PDF
    There has been a proliferation in the development of Lagrangian analytical methods for detecting coherent structures in fluid flow transport, yielding a variety of qualitatively different approaches. We present a review of four approaches and demonstrate the utility of these methods via their application to the same sample analytic model, the canonical double-gyre flow, highlighting the pros and cons of each approach. Two of the methods, the geometric and probabilistic approaches, are well established and require velocity field data over the time interval of interest to identify particularly important material lines and surfaces, and influential regions, respectively. The other two approaches, implementing tools from cluster and braid theory, seek coherent structures based on limited trajectory data, attempting to partition the flow transport into distinct regions. All four of these approaches share the common trait that they are objective methods, meaning that their results do not depend on the frame of reference used. For each method, we also present a number of example applications ranging from blood flow and chemical reactions to ocean and atmospheric flows. (C) 2015 AIP Publishing LLC.ONR N000141210665Center for Nonlinear Dynamic

    Paper Session III-C - AMSAT\u27s Phase 3-D Satellite New opportunities for Space Education

    Get PDF
    Teachers and amateur radio operators have been using satellites for education since the first OSCAR launch in 196L The recent high power OSCAR satellites are in use every day in classrooms around the world by teachers with amateur radio licenses. Central Florida hams are assembling Phase 3-D, the next generation amateur radio satellite. Phase 3-D will offer many new opportunities for education due to an earth-viewing camera experiment, and higher power which will permit schools to use the satellite with much less hardware. Locally the Phase 3-D integration team is looking for educational groups to participate in the assembly and testing of the spacecraft. We are hoping to offer students from the middle-school to university level hands-on experience with spacecraft manufacturing and testing

    Towards detection and control of civilian unmanned aerial vehicles

    Get PDF
    Considering the significant number of non‐military unmanned aerial vehicles (UAVs) that can be purchased to operate in unregulated air space and the range of such devices, the potential for security and privacy problems to arise is significant. This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes. Further, if these devices are not being detected, there is a privacy problem to be addressed as well. In this paper we test a specific UAV, the Parrot AR Drone version 2, and present a forensic analysis of tests used to deactivate or render the device inoperative. It was found that these devices are open to attack, which means they could be controlled by a third party

    An analysis of security issues in building automation systems

    Get PDF
    The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media. Through the use of IP-based communication and encapsulated protocols, BAS are increasingly being connected to corporate networks and also being remotely accessed for management purposes, both for convenience and emergency purposes. These protocols, however, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations, relying on security through obscurity. Research has been undertaken into addressing the shortfalls of security implementations in BAS, however defining the threats against BAS, and detection of these threats is an area that is particularly lacking. This paper presents an overview of the current security measures in BAS, outlining key issues, and methods that can be improved to protect cyber physical systems against the increasing threat of cyber terrorism and hacktivism. Future research aims to further evaluate and improve the detection systems used in BAS through first defining the threats and then applying and evaluating machine learning algorithms for traffic classification and IDS profiling capable of operating on resource constrained BAS
    • 

    corecore